Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Deniable authentication

Known as: Repudiability (cryptography), Repudiation (cryptography) 
In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular… Expand
  • table I
  • table II
  • table III
  • figure 2
  • table IV
Highly Cited
2009
Highly Cited
2009
Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2008
Highly Cited
2008
In this article, we propose a deniable electronic voting authentication protocol for mobile ad hoc networks, which meets the… Expand
  • table 1
  • figure 1
  • figure 2
  • table 3
  • table 4
Highly Cited
2006
Highly Cited
2006
We extend the definitional work of Dwork,Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then… Expand
  • figure 1
  • figure 2
Highly Cited
2005
Highly Cited
2005
Deniable authentication protocol is a new technique of modern cryptography, and several such schemes have been proposed. However… Expand
Highly Cited
2005
Highly Cited
2005
Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver, in a way that the Receiver cannot… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2004
Highly Cited
2004
  • Zuhua Shao
  • Comput. Stand. Interfaces
  • 2004
  • Corpus ID: 18768433
Abstract An efficient and non-interactive deniable authentication protocol is presented to enable a receiver to identify the… Expand
  • table 1
Highly Cited
2004
Highly Cited
2004
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems… Expand
Highly Cited
2003
Highly Cited
2003
Consider a CIA agent who wants to authenticate herself to a server but does not want to reveal her CIA credentials unless the… Expand
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2002
Highly Cited
2002
  • M. Naor
  • CRYPTO
  • 2002
  • Corpus ID: 10170993
Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some… Expand